Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 08:13

General

  • Target

    4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44N.exe

  • Size

    432KB

  • MD5

    0b87f79200fe9be5764c4608374590a0

  • SHA1

    4f25fca3cc3cc1dce6e2d393a3b88baa4780d983

  • SHA256

    4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44

  • SHA512

    64f778f49d89544dce02bf1a63e262d1be3682e9e9338295d391fffc4edab2032e257b91f6ab54e54f5dbe7dc9e6b9a51c782069f8d04cee7e0e09c0a8628efa

  • SSDEEP

    6144:PuJ5atbDKNvIO4noDkM3opkjNlS6ORIvFtw5YrOfknQz04N:w5qe5JgM2yNlSbPOOfknQl

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44N.exe
    "C:\Users\Admin\AppData\Local\Temp\4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44N.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\3582-490\4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44N.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44N.exe"
      2⤵
      • Executes dropped EXE
      PID:940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

          Filesize

          2.4MB

          MD5

          d9e8a1fa55faebd36ed2342fedefbedd

          SHA1

          c25cc7f0035488de9c5df0121a09b5100e1c28e9

          SHA256

          bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

          SHA512

          134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

        • C:\Users\Admin\AppData\Local\Temp\3582-490\4dd60ef0a55abf084fa8374b0d56c837ed7d3c3a352813ce40cdba2611636a44N.exe

          Filesize

          391KB

          MD5

          af1bd9715a0fbef5fc288276c4e904bd

          SHA1

          fa7c1cdd972e787f4c3cacbbf3e5c2ef9bb71997

          SHA256

          6ea9b83219a139506678e9982390c47a73136d5c57d06c00ee895c75e77c7457

          SHA512

          b3404f78f13cd9e162f0ea5817725aecf7ee49b86010de9d83380e65428c526dffc3ef32b35ea4c72f6cfed82de99cbc33f699a85915fcd8ac62b1010d5706fc

        • memory/940-13-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/940-14-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/1852-98-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1852-99-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1852-101-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB